Resources

Featured

Some of the key topics that were discussed include: • Why measures you are told to implement by vendors and regulators (e.g., cyber intelligence) actually do little to stop sophisticated hackers. • How some controls that get little attention (e.g.,…